2017
DOI: 10.3390/cryptography1020016
|View full text |Cite
|
Sign up to set email alerts
|

A Text-Independent Speaker Authentication System for Mobile Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 0 publications
0
8
0
Order By: Relevance
“…The majority of contemporary smart electronic gadgets have a microphone, allowing people to use voice in the authentication process [12]. Voice impersonation can recreate a voice, including pitch, tone to potentially fool this type of system.…”
Section: Voice Biometricsmentioning
confidence: 99%
“…The majority of contemporary smart electronic gadgets have a microphone, allowing people to use voice in the authentication process [12]. Voice impersonation can recreate a voice, including pitch, tone to potentially fool this type of system.…”
Section: Voice Biometricsmentioning
confidence: 99%
“…On-device-based Methods. Some works suggest running the systems on the device [35,97] and designing light encryption systems. Im et al in [43] propose a user-friendly, privacy-preserving face authentication system for smartphones to prevent malicious users from accessing the system.…”
Section: Secure Privacy-aware Biometric Systemsmentioning
confidence: 99%
“…Thullier et al [12] proposed a text independent SV technique for cellular phones through amplifiers. This technique has the aim of improving the SV system via three fundamental tasks.…”
Section: Literature Surveymentioning
confidence: 99%